Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/autre/information-technology-new-generations/descriptif_3964729
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3964729

Information Technology - New Generations, 1st ed. 2018 15th International Conference on Information Technology Advances in Intelligent Systems and Computing Series, Vol. 738

Langue : Anglais

Coordonnateur : Latifi Shahram

Couverture de l’ouvrage Information Technology - New Generations

This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology ? New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education.

Part I Cybersecurity
1. Safeguarding Personal Health Information: Case Study
2. Cybersecurity as People Powered Perpetual Innovation
3. Performance Study of the Impact of Security on 802.11ac Networks
4. Training Neural Tensor Networks with the Never Ending Language Learner
5. PERIA-Framework: A Prediction Extension Revision Image Annotation Framework
6. The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan
7. Evaluating Cyber Threats to the United Kingdom’s National Health Service (NHS) Spine Network
8. A Virtual Animated Commentator Architecture for Cybersecurity Competitions
9. Malicious Software Classification using VGG16 Deep Neural Network’s Bottleneck Features
10. Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach)
11. A Self Proxy Signature Scheme over NTRU Lattices
12. Towards an Ontology of Security Assessment: a core model proposal
13. Integration of Mobile Forensic Tool Capabilities
14. Deep Packet Inspection: A Key Issue for Network Security
15. What Petya/NotPetya Ransomware is and What its Remidiations are
16. Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform
17. New Techniques for Public Key Encryption with Sender Recovery
18. Cloud Intrusion Detection and Prevention system for M-voting application in South Africa
19. Protecting Personal Data with Blockchain Technology
20. The Role of CAE-CDE in Cybersecurity Education for Workforce Development
21. Software Optimizations for DES 
Part II Networking and Wireless Communications
22. Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment
23. End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks
24. Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges
25. A Dual canister medicine IoT Dispenser
26. Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks
27. Denial of service attacks in wireless sensor networks with proposed countermeasures
Part III Education and Technology
28. Internet-Based Education: A New Milestone for Formal Language and Automata Courses
29. Teaching Communication Management in Software Projects through Serious Educational Games
30. Gamification applied in the teaching of agile Scrum methodology
31. An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework 
Part IV Agile Software Testing and Development
32. Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects
33. Alignment of Requirements and Testing in Agile: an Industrial Experience
34. Health Care Information Systems: A Crisis Approach
35. Using Correct-by-Construction Software Agile Development
36. Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services  
37. Improving Agile Software Development with Domain Ontologies
38. A Stratified Sampling Algorithm for Artificial Neural Networks
Part V Data Mining/Machine Learning  
39. Mining ENADE Data from the Ulbra Network Institution
40. Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)
41. Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise
42. Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets
43. Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series
44. DeRis: Information system supporting the prediction of default risk in companies
45. Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm
46. Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics
47. A model for hour-wise prediction of mobile device energy availability
48. Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model
49. A Traffic Light Recognition Device
50. An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment
51. Reproducible Research in Document Analysis and Recognition
52. Music Genre Classification using Data Mining and Machine Learning 
53. Improving word representations using Paraphrase dataset
54. A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions
55. Dual Long Short-Term Memory Networks for Sub-Character Representation Learning
56. Business Intelligence Dashboard Application for Insurance Cross Selling 
57. Speech Features Analysis for Tone Language Speaker Discrimination Systems
58. Selection of Transformations of Continuous Predictors in Logistic Regression
Part VI Software Engineering 
59. A Generic Approach to Efficiently Parallelize Legacy Sequential Software
60. Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications
61. A Timed Petri Net Model to Specify Scenarios of Video Games
62. Survey of Biometric Techniques for Automotive Applications
63. A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations
64. Budget and User Feedback Control Strategy-based PRMS Scenario Web Application
65. A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules
66. An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games
67. A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies
68. Increasing the prediction quality of software defective modules with automatic feature engineering
Part VII High Performance Computing Architectures 
69. NSF Noyce Recruitment and Mentorship
70. Mining Associations between Two Categories using Unstructured Text Data in Cloud
71. A Note on Computational Science Curriculum
72. Development of a Local Cloud-Based Bioinformatics Architecture
Part VIII
73. A Computer Vision Based Algorithm for Obstacle Avoidance
74. The ST-Vis tool for SpatioTemporal Visualization
75. Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima
76. Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network
77. Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation
78. Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries
Part IX Health, Bioinformatics, Pattern Detection and Optimization 
79. Benefits of Establishing Makerspaces in Distributed  Development Environment
80. Semantic Description of Healthcare Devices to Enable Data Integration
81. Applying transfer learning to QSAR regression models
82. Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine
83. A Complete Diabetes Management and Care System
84. On the use of van der Pauw Technique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring
Part X Potpourri
85. Smart Lighting Controlling System: Case Study of Yarmouk University Museum
86. Incremental Topology Generated for ANN A Case Study on a Helicopter’s Flight Simulation
87. Degree Aware Triangulation of Annular Regions
88. Heuristic Approaches for the Open-Shop Scheduling Problem
89. Continuous State Power-down Systems for Renewable Energy Management
90. Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems
Part XI Short Papers 
91. Customer services management and satisfaction of Internet-related banking of First National Bank
92. BIG IoT – Interconnecting IoT Platforms from different domains - First success story
93. Cross-Cultural Perspective of E-Commerce Website Usability Requirements: Through the Lens of Individual’s Perception
94. Methods of Ensuring the Reliability and Fault Tolerance of Information Systems
95. Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise
96. Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly
97. A Classifier Evaluation for Payments’ Default Predictions in a Brazilian Retail Company
98. Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review
99. Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus)
100. Method of Processing Big Data
101. Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan
102. Modified Human Code for Bandwidth Optimization through Lossless Compression
Index

Shahram Latifi, PhD, P.E., is Professor of Electrical and Computer Engineering and Co-director of Center for Information Technology, College of Engineering at the University of Nevada, Las Vegas

Features the most recent advances in information technology;

Presents early work and novel results from research laboratories around the world;

Facilitates managers making business decisions, academics shaping research work, and educators keeping abreast of recent advances in learning technologies.

Date de parution :

Ouvrage de 818 p.

21x27.9 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

Prix indicatif 158,24 €

Ajouter au panier

Date de parution :

Ouvrage de 818 p.

21x27.9 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

Prix indicatif 158,24 €

Ajouter au panier